1 /* 2 * Copyright (C) Internet Systems Consortium, Inc. ("ISC") 3 * 4 * Permission to use, copy, modify, and/or distribute this software for any 5 * purpose with or without fee is hereby granted, provided that the above 6 * copyright notice and this permission notice appear in all copies. 7 * 8 * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH 9 * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY 10 * AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, 11 * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM 12 * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE 13 * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR 14 * PERFORMANCE OF THIS SOFTWARE. 15 */ 16 17 /* $Id: sha2.h,v 1.4 2020/02/24 13:49:38 jsg Exp $ */ 18 19 /* $FreeBSD: src/sys/crypto/sha2/sha2.h,v 1.1.2.1 2001/07/03 11:01:36 ume Exp $ */ 20 /* $KAME: sha2.h,v 1.3 2001/03/12 08:27:48 itojun Exp $ */ 21 22 /* 23 * sha2.h 24 * 25 * Version 1.0.0beta1 26 * 27 * Written by Aaron D. Gifford <me@aarongifford.com> 28 * 29 * Copyright 2000 Aaron D. Gifford. All rights reserved. 30 * 31 * Redistribution and use in source and binary forms, with or without 32 * modification, are permitted provided that the following conditions 33 * are met: 34 * 1. Redistributions of source code must retain the above copyright 35 * notice, this list of conditions and the following disclaimer. 36 * 2. Redistributions in binary form must reproduce the above copyright 37 * notice, this list of conditions and the following disclaimer in the 38 * documentation and/or other materials provided with the distribution. 39 * 3. Neither the name of the copyright holder nor the names of contributors 40 * may be used to endorse or promote products derived from this software 41 * without specific prior written permission. 42 * 43 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) AND CONTRIBUTOR(S) ``AS IS'' AND 44 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 45 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 46 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR(S) OR CONTRIBUTOR(S) BE LIABLE 47 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 48 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 49 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 50 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 51 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 52 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 53 * SUCH DAMAGE. 54 * 55 */ 56 57 #ifndef ISC_SHA2_H 58 #define ISC_SHA2_H 59 60 #include <isc/types.h> 61 62 /*** SHA-224/256/384/512 Various Length Definitions ***********************/ 63 64 #define ISC_SHA224_BLOCK_LENGTH 64U 65 #define ISC_SHA224_DIGESTLENGTH 28U 66 #define ISC_SHA224_DIGESTSTRINGLENGTH (ISC_SHA224_DIGESTLENGTH * 2 + 1) 67 #define ISC_SHA256_BLOCK_LENGTH 64U 68 #define ISC_SHA256_DIGESTLENGTH 32U 69 #define ISC_SHA256_DIGESTSTRINGLENGTH (ISC_SHA256_DIGESTLENGTH * 2 + 1) 70 #define ISC_SHA384_BLOCK_LENGTH 128 71 #define ISC_SHA384_DIGESTLENGTH 48U 72 #define ISC_SHA384_DIGESTSTRINGLENGTH (ISC_SHA384_DIGESTLENGTH * 2 + 1) 73 #define ISC_SHA512_BLOCK_LENGTH 128U 74 #define ISC_SHA512_DIGESTLENGTH 64U 75 #define ISC_SHA512_DIGESTSTRINGLENGTH (ISC_SHA512_DIGESTLENGTH * 2 + 1) 76 77 /*** SHA-256/384/512 Context Structures *******************************/ 78 79 #include <openssl/evp.h> 80 81 typedef struct { 82 EVP_MD_CTX *ctx; 83 } isc_sha2_t; 84 85 typedef isc_sha2_t isc_sha256_t; 86 typedef isc_sha2_t isc_sha512_t; 87 88 typedef isc_sha256_t isc_sha224_t; 89 typedef isc_sha512_t isc_sha384_t; 90 91 /*** SHA-224/256/384/512 Function Prototypes ******************************/ 92 93 void isc_sha224_init (isc_sha224_t *); 94 void isc_sha224_update (isc_sha224_t *, const uint8_t *, size_t); 95 void isc_sha224_final (uint8_t[ISC_SHA224_DIGESTLENGTH], isc_sha224_t *); 96 97 void isc_sha256_init (isc_sha256_t *); 98 void isc_sha256_update (isc_sha256_t *, const uint8_t *, size_t); 99 void isc_sha256_final (uint8_t[ISC_SHA256_DIGESTLENGTH], isc_sha256_t *); 100 101 void isc_sha384_init (isc_sha384_t *); 102 void isc_sha384_update (isc_sha384_t *, const uint8_t *, size_t); 103 void isc_sha384_final (uint8_t[ISC_SHA384_DIGESTLENGTH], isc_sha384_t *); 104 105 void isc_sha512_init (isc_sha512_t *); 106 void isc_sha512_update (isc_sha512_t *, const uint8_t *, size_t); 107 void isc_sha512_final (uint8_t[ISC_SHA512_DIGESTLENGTH], isc_sha512_t *); 108 109 #endif /* ISC_SHA2_H */ 110